OwlH Master API
☆24Apr 27, 2025Updated 10 months ago
Alternatives and similar repositories for OwlH-Master
Users that are interested in OwlH-Master are comparing it to the libraries listed below
Sorting:
- OwlH Master API Web User Interface☆12May 5, 2024Updated last year
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25May 5, 2017Updated 8 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated 11 months ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- CUPS/Foomatic driver for Brother P-touch and QL label printers☆12Mar 17, 2025Updated 11 months ago
- SDN Firewall IDP project☆13May 31, 2024Updated last year
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆96Apr 30, 2024Updated last year
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- Script to generate an html reports of installed software, installed updates and installed components on a remote computer☆11Mar 13, 2025Updated 11 months ago
- Fast, lightweight toy container system☆11Oct 18, 2020Updated 5 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- A low-cost, DIY data diode for ICS☆11Sep 4, 2023Updated 2 years ago
- An Ansible library module that allows modifying json files without the use of copy, templates or assemble☆12Apr 1, 2020Updated 5 years ago
- GoDice Unity Demo☆13Aug 7, 2024Updated last year
- Tool for end-to-end testing of proxy servers☆11Dec 24, 2022Updated 3 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- Sync a Cloudflare DNS record with your public IP address.☆12Feb 27, 2026Updated last week
- Go HTTP Middleware with dynamic CSP nonce and much more☆16Aug 28, 2018Updated 7 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Various Atlassian Confluence related tools☆19Updated this week
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 10 months ago
- An example / test case of importing typescript modules located in a node_modules folder.☆10Nov 4, 2015Updated 10 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- TWRP device tree for ZTE Axon 7 (ailsa_ii)☆12Mar 7, 2022Updated 3 years ago
- ☆10May 6, 2023Updated 2 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago